Sciweavers

8647 search results - page 1404 / 1730
» The Container Selection Problem
Sort
View
ICCAD
2002
IEEE
152views Hardware» more  ICCAD 2002»
16 years 1 months ago
Efficient instruction encoding for automatic instruction set design of configurable ASIPs
Application-specific instructions can significantly improve the performance, energy, and code size of configurable processors. A common approach used in the design of such instruc...
Jong-eun Lee, Kiyoung Choi, Nikil Dutt
HICSS
2010
IEEE
149views Biometrics» more  HICSS 2010»
15 years 11 months ago
Changing the Perspective: Improving Generate thinkLets for Ideation
Creativity techniques provide a variety of approaches for supporting an ideation process. These techniques can be executed using a Group Support System (GSS), thus allowing the id...
Stefan Werner Knoll, Graham Horton
PDP
2010
IEEE
15 years 11 months ago
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
Abstract—The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. T...
Florian Skopik, Daniel Schall, Schahram Dustdar
136
Voted
CHI
2010
ACM
15 years 11 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
CVPR
2009
IEEE
15 years 11 months ago
Random walks on graphs to model saliency in images
We formulate the problem of salient region detection in images as Markov random walks performed on images represented as graphs. While the global properties of the image are extra...
Viswanath Gopalakrishnan, Yiqun Hu, Deepu Rajan
« Prev « First page 1404 / 1730 Last » Next »